By Julian Fay, Chief Technology Officer, Senetas
27/08/2025
Why real-time links for uncrewed systems demand purpose-built network encryption —and quantum-safe resilience
Uncrewed vehicles – surface vessels, underwater drones and aerial vehicles – are quietly transforming warfare operations. Militaries rely on them for everything from mine detection to striking targets and intelligence gathering, often in dangerous sites where sending personnel would be reckless or impossible. The benefits are clear: by taking humans out of harm’s way, these robotic platforms are saving lives, speeding decision-making, extending mission duration and pushing the boundaries of what is possible in modern warfare, as notably seen with the use of drones in Ukraine.
Yet as uncrewed systems multiply, a critical vulnerability persists just beneath the surface. The sophistication of these vehicles is rarely matched by the security around their communication networks. Too often, the real-time data they send back to base travels over channels susceptible to interception, manipulation or outright theft. The result is a growing gap in defense, one that adversaries and opportunists alike are quick to exploit.
The call to action is simple but urgent. As nations deploy more autonomous and remotely operated systems, they must match technical advances and invest in reliable network encryption hardware to protect multi-Gbps video, sonar and telemetry as it traverses harsh, contested networks.
Two sides of the security challenge
Real-time feeds are the lifeblood of modern operations. Whether an underwater drone relays sonar images of a suspected mine or an aerial system streams video of a suspicious vehicle, these connections must be secured by encryption designed for low-latency links.
Securing the communication links of uncrewed vehicles is not simply a technical challenge. It is a strategic imperative. In today’s interconnected theatre, it is the data – the sensor readings, mission updates, positional information and command signals – that delivers value. If these streams are disrupted or hijacked, the integrity of entire operations can be undermined.
But uncrewed devices share a common Achilles heel: real-time communications. The challenge is two-sided.
- First, live feeds must be kept inviolable during operations. Uncrewed systems must protect what they see, hear, and transmit – so enemies can’t steal or change it.
- Second, because these assets are small, remote and disposable, the probability of loss or capture is high. Without built-in protection, compromised data can undermine missions or fall into adversaries’ hands.
The threat doesn’t stop at the vehicle itself. The security of the critical national assets that enable uncrewed operations – such as undersea gas, electricity and internet cables, satellite uplinks, radio relays and data centers – must also be woven together.
Beyond the Battlefield: Quantum-Safe Encryption and the ‘Harvest Now, Decrypt Later’ Risk
The security challenge reaches far beyond military circles. For example, the concept of Maritime Domain Awareness (MDA) has expanded well past defense, now encompassing civilian agencies and regulators who leverage both classified and open-source information to manage risks at sea. Every maritime actor – from shipping companies to environmental monitors – is part of a far-ranging network where information must be shared, analysed and acted upon. When communications are insecure, vulnerabilities multiply across domains.
This challenge is profoundly amplified by the imminent threat of “Harvest Now, Decrypt Later”. The concept posits that adversaries can capture and store encrypted data today, even if they cannot decrypt it with current technology, with the intent of decrypting it in the future when more powerful computing capabilities, such as quantum computers, become available. This is why post-quantum encryption planning matters now—even if adversaries cannot yet decrypt the information they collect.
This poses a long-term risk to highly sensitive long-lifetime information transmitted by uncrewed vessels. Given that these vehicles might be shot down or picked up by an enemy, any data they transmit or store could become compromised years down the line, undermining the secrecy of past missions or the security of future operations.
It is also crucial to address the “edge-appliance blind spot,” where military and independent software vendors (ISVs) often omit robust, FIPS-certified crypto modules and therefore lack adequate security for these real-time feeds. The entire communications and networks supporting these autonomous and remotely operated systems must be defended.
Architecting Encryption for Uncrewed Systems
To mitigate such threats, current security designs for uncrewed systems can incorporate several proactive measures:
- Two layers of protection: Utilising distinct forms of encryption, akin to nesting a safe within another safe, based on proven and widely available technologies. The NSA already uses this model for protecting highly classified data.
- Flexibility for the future: Systems that are designed to quickly adapt to newer, stronger security standards as technology evolves. This adaptability is crucial for preparing for the eventual emergence of quantum computing capabilities.
- Automatic self-erase: Vehicles can be configured to wipe their memory in the event of a crash, tampering, or loss of contact with their home base. This is exemplified by Remote Zeroization (RUZ), which erases data when triggered, and High-Security Zeroization (HSZ), which automatically wipes data if a critical signal is lost.
- Temporary keys: The use of short-term “digital keys” that expire quickly ensures that even if a vehicle is captured, the data becomes useless once the keys are no longer valid. These short-lived keys reduce the value of intercepted data streams and align with zero-trust security principles.
- Separating functions: Keeping navigation, video and communications separate from security systems helps ensure that if one part is compromised, the rest remain protected.
Senetas, for instance, supports a layered approach to protecting data on uncrewed platforms, using commercially approved technologies that are easier to deploy and manage than traditional, tightly restricted military cryptography. Our encryptors are also FIPS certified, providing assurance that they meet internationally recognised standards for security and interoperability. This makes them a smart choice for balancing protection with practicality—particularly for small, mobile, or remote systems. To find out more about our network encryption hardware for uncrewed systems, learn more here.
Trials with the Australian Defence Force, such as Exercise Autonomous Warrior, are proving grounds for testing these ideas, demonstrating that commercial encryption is ready for today’s missions and can enable secure teamwork among uncrewed vehicles from different forces while protecting data in tough environments.
Securing the future of uncrewed operations
Looking ahead, the increasing autonomy and teamwork among uncrewed vehicles introduce new risks and an even greater need for protection. Countries must retain control over their own security systems, especially when collaborating with allies. The “Harvest Now, Decrypt Later” imperative highlights the urgent need for investment in encryption and robust security for autonomous and remotely operated systems, particularly for real-time communication feeds between vehicles and command, with post-quantum encryption playing a critical role in ensuring that today’s data remains secure against tomorrow’s computing threats.
Leaders in defense, government and industry must act now. Robust encryption and resilient cybersecurity cannot be optional add-ons – they are the backbone of operational integrity, national security and strategic advantage. By embedding advanced protections directly into uncrewed systems, edge devices and the networks that connect them, nations can ensure that technological advances translate into lasting operational superiority. To explore how Senetas can help architect network encryption for uncrewed systems—including high-performance 100Gbps encryptor options—contact us to discuss your requirements.